Ceriwis  

Go Back   Ceriwis > Jual Beli > Komputer & Laptop > Software Original & Open Source

Software Original & Open Source Khusus software

Reply
 
Listing Tools
  #1  
Old 26th May 2012
mousekompi's Avatar
mousekompi mousekompi is offline
Senior Ceriwiser
 
Join Date: May 2012
Posts: 8,922
Rep Power: 25
mousekompi mempunyai hidup yang Normal
Default DVD Tutorial backtrack, metasploit, wireless hacking

Kondisi Barang : Baru

Harga :



Lokasi Seller : Jawa Barat


Description :







[FONT="Verdana]Seperti yang agan2 lihat dari judul diatas, ane sekarang menjual DVD Tutorial , semua tutorial ane pastikan sangat membantu agan2 yang sedang mulai untuk belajar backtrack, metasploit, wireless hacking, dan masih banyak lagi. Semua tutorial berisi informasi yang up to date dan teknik-teknik dari dasar hingga tingkat yang lebih expert. Berikut daftar tutorial yang bakal agan dapetin :[/font]




[/spoiler]
Spoiler for open this:
Spoiler for open this:
for 1. Metasploit Framework Expert:






Video yang membahas tentang Metasploit Framework secara mendalam.



- Exploitation Basics

- Why Metasploit?

- Meterpreter Basics

- Armitage

- Framework Organization

- Post Exploitation Kung-Fu

- Post Exploitation Privilege Escalation

- Killing AV and Disabling Firewall

- Stdapi and Priv Extensions

- Token Stealing and Incognito

- Espia and Sniffer Extensions in Post Exploitation

- Post Exploitation Backdoors

- Pivoting after Post Exploitation

- Port Forwarding as part of Post Exploitation

- Client Side Exploits

- Backdoors and Rootkits in Post Exploitation

- Exploit Research with Metasploit

- Railgun Basics

- Railgun Adding Functions

- Railgun Adding New DLLs

- Railgun Adding New DLLs on Windows 7

- Resource Scripts

- Database Support

- Using Plugins

- Meterpreter API Basics

- Meterpreter Scripting Migrate Clone

- Meterpreter Scripting Process Name Search








Spoiler for open this:
Spoiler for open this:
for 2. Wireless LAN Security and Penetration Testing:






Video yang membahas tentang dasar-dasar Wireless sampai dengan penetrasi menggunakan tehnik sniffing, injeksi, kracking, dan masih banyak lagi tehnik serangan terhadap wireless.



- Getting Started

- Bands, Channels and Sniffing

- Pwning Beacon Frames

- Dissecting AP-Client Connections

- Dissecting WLAN Headers

- Pwning Hidden SSIDs

- Laughing Off MAC Filters

- Hacking WLAN Authentication

- Hotspot Attacks

- Hacking Isolated Clients

- Alfa Card Kung-Fu

- Man-in-the-Middle Attack

- SSL MITM Attack Over Wireless

- SSL MITM Attack Over Wireless Demo

- SSL Man-in-the-Middle Attacks

- Custom Wireless Regulation Database

- WEP In-Depth

- WEP kracking

- Caffe Latte Attack Basics

- Caffe Latte Attack Demo

- Caffe Latte Attack on the iPhone

- KoreK's ChopChop Attack

- Fragmentation and Hirte Attack

- Understanding WPA/WPA2

- Wi-Fi Challenge 1 (Level Easy) : There is no Patch for Stupidity!

- Wi-Fi Challenge 1 Solution : There is no Patch for Stupidity!

- Wi-Fi Challenge 2 (Level - Intermediate) : Know Thy Packets

- Wi-Fi Challenge 2 Solution : Know Thy Packets

- Wi-Fi Challenge 3 (Level Advanced): Never Underestimate your Enemy!

- WPA-PSK

- WPA-PSK kracking

- WPA2-PSK kracking

- Speeding up WPA/WPA2 PSK kracking

- Never Underestimate Your Enemy!

- Mood Swings of a Wandering Client

- kracking WPA/WPA2-PSK with just the Client

- Questions and Answers

- Wpa_Supplicant

- krack WPA-Personal with only AP

- Setting up FreeRadius-WPE on Backtrack

- EAP-MD5 Basics and Demo

- kracking EAP-MD5 with Eapmd5pass and Eapmd5krack

- EAP Types and PEAP Demo

- kracking PEAP

- kracking PEAP in a Windows Network

- kracking EAP-TTLS

- Insecurity in 3rd Party Wi-Fi Utilities

- Conclusion and the Road Ahead

- Windows Wireless Kung-Fu (SWSE Addendum 1)

- Creating Wireless Backdoors (SWSE Addendum 2)

- Malware, Metasploit and the Hosted Network (SWSE Addendum 3)

- SecurityTube Certified Wi-Fi Security Expert (SWSE) Student Portal Launch








Spoiler for open this:
Spoiler for open this:
for 3. Exploit Research:






Video yang membahas tentang bagaimana cara membuat kode-kode exploitasi dari memanfaatkan kelemahan pada aplikasi.



- Topic Introduction

- Memcpy Buffer Overflow

- Strcpy Buffer Overflow

- Minishare Buffer Overflow

- FreeSSHD Buffer Overflow

- SEH Basics

- Overwrite SEH

- Exploiting SEH

- Guest Lecture by Andrew King

- Binary Diffing Microsoft Patches








Spoiler for open this:
Spoiler for open this:
for 4. Metasploit Tutorial:




Video yang membahas tentang menggunakan Metasploit dari awal,sampai dengan menulis skrip dan modul meterpreter.



- Exploitation Basics and need for Metasploit

- Getting Started with Metasploit

- Meterpreter Basics and using Stdapi

- Meterpreter Extensions Stdapi and Priv

- Understanding Windows Tokens and Meterpreter Incognito

- Espia and Sniffer Extensions with Meterpreter Scripts

- Metasploit Database Integration and Automating Exploitation

- Post Exploitation Kung Fu

- Post Exploitation Privilege Escalation

- Post Exploitation Log Deletion and AV Killing

- Post Exploitation and Stealing Data

- Post Exploitation Backdoors and Rootkits

- Post Exploitation Pivoting and Port Forwarding

- Backdooring Executables

- Auxiliary Modules

- Pass the Hash Attack

- Scenario Based Hacking








Spoiler for open this:
Spoiler for open this:
for 5. Windows Assembly Language for Hackers:




Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi windows.



- Processor Modes

- Protected Mode Assembly

- Win32 ASM using MASM32

- MASM Data Types

- Procedures

- Macros

- Program Control using JMP

- Decision Directives

- Loops








Spoiler for open this:
Spoiler for open this:
for 6. Assembly Language for Linux:




Video yang membahas tentang cara menulis kode exploit menggunakan bahasa assembly untuk sistem operasi Linux.



- System Organization

- Virtual Memory Organization

- GDB Usage Primer

- Hello World

- Data Types

- Moving Data

- Working with Strings

- Unconditional Branching

- Conditional Branching

- Functions

- Functions Stack








Spoiler for open this:
Spoiler for open this:
for 7. Buffer Overflow Exploitation for Linux:




Video yang membahas tentang cara dasar buffer overflows dan melakukan exploitasi terhadap sistem operasi Linux.



- Smashing the Stack

- Writing Exit Shellcode

- Executing Shellcode

- Disassembling Execve

- Shellcode for Execve

- Exploiting a Program

- Exploiting a Program Demo

- Return to Libc Theory

- Return to Libc Demo








Spoiler for open this:
Spoiler for open this:
for 8. Format String Vulnerabilities:




Video yang membahas tentang cara memanfaatkan kelemahan dalam format penulisan kode program dan mengexploitasinya.



- The Basics

- Understanding Format Functions

- Crashing the Program

- Viewing the Stack








Spoiler for open this:
Spoiler for open this:
for 9. Scenario Based Hacking and Penetration Testing:




Video yang membahas tentang skenario dari tehnik hacking.



- No Patches, No AV, Direct Access

- No Patches, No AV, Behind NAT

- OS Patched, No AV, Behind NAT

- OS and Software Patched, No AV, Behind NAT








Spoiler for open this:
Spoiler for open this:
for 10. Router Hacking Series:




Video yang membahas tentang cara melakukan hacking kepada router.



- The Basics

- Service Enumeration, Fingerprinting and Default Accounts

- Bruteforcing and Dictionary Attacks with Hydra

- SNMP Attacks using SNMPCheck

- SNMP Attacks using SNMPEnum

- Dictionary Attack using Metasploit on SNMP








[spoiler=open this] for Harga?:




cukup 130rb aja gan (exclude ongkir)







[FONT="Verdana]buat agan2 yang berminat, langsung aja SMS ane di:

087821491894
[/font]

Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off


 


All times are GMT +7. The time now is 05:49 PM.


no new posts